Package: cpushare Version: 0.48-2 Severity: grave Until Debian kernels are built with CONFIG_SECCOMP again (see #474648), there is no real point in shipping CPUShare packages: it relies on seccomp to run untrusted bytecode.
-- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.24.3 (SMP w/2 CPU cores; PREEMPT) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages cpushare depends on: ii adduser 3.107 add and remove users and groups ii binutils 2.18.1~cvs20080103-4 The GNU assembler, linker and bina ii libc6-i386 2.7-10 GNU C Library: 32bit shared librar ii python 2.5.2-1 An interactive high-level object-o ii python-openssl [pyt 0.6-5 Python wrapper around the OpenSSL ii python-pyopenssl 0.6-5 transitional dummy package ii python-support 0.7.7 automated rebuilding support for P ii python-twisted-core 8.0.1-1 Event-based framework for internet cpushare recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]